International Journal of Theoretical Physics

, Volume 50, Issue 9, pp 2703–2707 | Cite as

Comment on “Quantum Key Distribution and Quantum Authentication Based on Entangled State”

  • Toung-Shang Wei
  • Chia-Wei Tsai
  • Tzonelih Hwang


Shi et al. (Phys. Lett. A 281:83–87, 2001) proposed a scheme which allows simultaneous realization of quantum key distribution and quantum authentication. However, this study points out a weakness in Shi et al.’s scheme, in which a malicious user can impersonate a legitimate participant without being detected. Furthermore, an improved scheme is proposed to avoid this weakness.


Quantum key distribution and quantum authentication 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing (invited paper). In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, Dec., pp. 175–179 (1984) Google Scholar
  2. 2.
    Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121–3124 (1992) ADSMATHCrossRefMathSciNetGoogle Scholar
  3. 3.
    Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 0323021 (2002) CrossRefGoogle Scholar
  4. 4.
    Li, C., Song, H.S., Zhou, L., Wu, C.F.: A random quantum key distribution achieved by using Bell states. J. Opt. B, Quantum Semiclass. Opt. 5(2), 155–157 (2003) ADSCrossRefGoogle Scholar
  5. 5.
    Song, D.: Secure key distribution by swapping quantum entanglement. Phys. Rev. A 69(3), 034301 (2004) ADSCrossRefGoogle Scholar
  6. 6.
    Namiki, R., Hirono, T.: Efficient-phase-encoding protocols for continuous-variable quantum key distribution using coherent states and postselection. Phys. Rev. A 74, 032302 (2006) ADSCrossRefGoogle Scholar
  7. 7.
    Hwang, T., Lee, K.C.: EPR quantum key distribution protocols with potential 100% qubit efficiency. IET Proc. Inf. Secur. 1, 43–45 (2007) CrossRefGoogle Scholar
  8. 8.
    Hwang, H., Lee, K.C., Li, C.M.: Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Dependable Secure Comput. 4, 71–80 (2007) CrossRefGoogle Scholar
  9. 9.
    Gan, G.: Quantum key distribution scheme with high efficiency. Commun. Theor. Phys. 51(5), 820–822 (2009) ADSMATHCrossRefMathSciNetGoogle Scholar
  10. 10.
    Dušek, M., Haderka, Q., Hendrych, M., Myška, R.: Quantum identification system. Phys. Rev. A 60(1), 149–155 (1998) ADSGoogle Scholar
  11. 11.
    Ljunggren, D., Bourennane, M., Karlsson, A.: Authority-based user authentication in quantum key distribution. Phys. Rev. A 62, 022305 (2000) ADSCrossRefGoogle Scholar
  12. 12.
    Zeng, G.H., Zhang, W.P.: Identity verification in quantum key distribution. Phys. Rev. A 61, 022303 (2000) ADSCrossRefGoogle Scholar
  13. 13.
    Shi, B.S., Li, J., Liu, J.M., Fan, X.F., Guo, G.C.: Quantum key distribution and quantum authentication based on entangled state. Phys. Lett. A 281, 83–87 (2001) ADSMATHCrossRefMathSciNetGoogle Scholar
  14. 14.
    Curty, M., Santos, D.J.: Quantum authentication of classical messages. Phys. Rev. A 64, 062309 (2001) ADSCrossRefGoogle Scholar
  15. 15.
    Mihara, T.: Quantum identification schemes with entanglements. Phys. Rev. A 65, 052326 (2002) ADSCrossRefGoogle Scholar
  16. 16.
    Li, X.O.: Quantum authentication using entangled states. Int. J. Found. Comput. Sci. 15(4), 609–617 (2004) MATHCrossRefGoogle Scholar
  17. 17.
    Zhou, N.R., Zeng, G.H., Zeng, W.J., Zhu, F.H.: Cross-center quantum identification scheme based on teleportation and entanglement swapping. Opt. Commun. 254, 380–388 (2005) ADSCrossRefGoogle Scholar
  18. 18.
    Zhang, Z.H., Zeng, G.H., Zhou, N.R., Xiong, J.: Quantum identity authentication based on ping-pong technique for photons. Phys. Lett. A 356, 199–205 (2006) ADSMATHCrossRefGoogle Scholar
  19. 19.
    Yang, Y.G., Wen, Q.Y., Zhu, F.C.: An efficient quantum secure direct communication scheme with authentication. Chin. Phys. B 16(7), 1838–1842 (2007) ADSCrossRefGoogle Scholar
  20. 20.
    Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Secure authentication of classical messages with single photons. Chin. Phys. B 18(8), 3189–3192 (2009) ADSCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  • Toung-Shang Wei
    • 1
  • Chia-Wei Tsai
    • 1
  • Tzonelih Hwang
    • 1
  1. 1.Department of Computer Science and Information EngineeringNational Cheng Kung UniversityTainanTaiwan

Personalised recommendations